IT Brief Asia - Technology news for CIOs & IT decision-makers

Secure by Design stories

Automation resilience it systems server room robotic arms managing cables

SolarWinds unveils AI Agent to boost IT resilience & automation

Last month
#
secure by design
SolarWinds launches AI Agent to boost IT resilience, automating incident response and simplifying operations for more proactive innovation in complex systems.
Secure cloud servers ai financial operations southeast asia digital economy

CloudMile unveils LumiTure.ai to boost secure AI & FinOps

Last month
#
secure by design
CloudMile has launched LumiTure.ai, a multi-cloud FinOps platform aimed at enhancing secure AI adoption and financial operations across Southeast Asia.
Carolyn

Exclusive: Cloudera’s Carolyn Duby warns of rising AI-powered cybercrime

Last month
#
secure by design
AI-driven cyberattacks now cost firms on average USD $4 million and 100 days to recover, raising security to a vital business priority worldwide.
Modern flat illustration computer monitor code digital locks shields ai coding security

Secure Code Warrior launches free AI coding security series

Wed, 10th Sep 2025
#
secure by design
Secure Code Warrior has launched a free 12-week YouTube series to help developers tackle AI-assisted coding security challenges and reduce organisational risks.
Jen easterly

Jen Easterly joins Huntress as adviser amid USD $1.5bn expansion

Thu, 21st Aug 2025
#
secure by design
Jen Easterly, former US cybersecurity chief, joins Huntress advisory board as firm expands with USD $1.5bn valuation and boosts AI cyber defence services.
Ps   jen easterly   headshot

Jen Easterly joins Huntress Strategic Advisory Board for AI focus

Thu, 21st Aug 2025
#
secure by design
Jen Easterly, ex-CISA Director, joins Huntress' Strategic Advisory Board to enhance AI-led cybersecurity as the firm advances its USD $1.5 billion growth.
Uk company director holding smartphone face scan identity verification worried expression british office building digital lock graphics

Concerns grow over UK digital ID checks for company directors

Thu, 7th Aug 2025
#
secure by design
UK plans to enforce digital ID checks for company directors face criticism over security flaws in the GOV.UK One Login system and risks during a phased 12-month rollout.
Secure server room firewall network cables multifactor auth taiwan architecture

Zyxel advances Secure by Design for global SMB networking security

Thu, 10th Jul 2025
#
secure by design
Zyxel Networks adopts CISA's Secure by Design Pledge, enhancing SMB networking security with MFA, unique passwords, and transparent vulnerability reporting worldwide.
Autonomous vehicles coordinating city emergency secure digital connections

When emergency strikes, it’s time for a native zero-trust network

Wed, 9th Jul 2025
#
secure by design
NetFoundry pioneers native zero-trust networks to securely orchestrate autonomous vehicles during emergencies, preventing cyberattacks and ensuring swift response.
Techday f d4736250f017dc715443

Kaspersky study: 71% in Asia Pacific back Cyber Immunity

Fri, 2nd May 2025
#
secure by design
Seventy-one per cent of Asia Pacific cybersecurity experts back Cyber Immunity as an effective defence, says Kaspersky's study of 850 professionals.
Techday daac3b0edc09fc9d5caa

VyperCore launches cloud platform showcasing processors

Fri, 14th Feb 2025
#
secure by design
VyperCore has unveiled VyperLab, a cloud platform for showcasing its high-performance processors, promising up to 80% energy savings and fivefold performance boosts.
Techday 3cc148cc73b7bb314111

OpenText partners with Secure Code Warrior to boost security

Fri, 6th Dec 2024
#
secure by design
OpenText has partnered with Secure Code Warrior to enhance security in software development by integrating real-time training into its Fortify product suite.
Techday efbbef20a477e8882e07

Logiq wins contract with MoD for Secure by Design work

Tue, 19th Nov 2024
#
secure by design
Bristol's Logiq secures a key MoD contract, partnering with Deloitte for another year on the Secure by Design initiative to bolster national cyber security.
Techday 70ffb0efa38448d45e7e

Memory safety vulnerabilities continue to plague ICS: Here’s what to do about it

Thu, 24th Oct 2024
#
secure by design
Memory safety vulnerabilities are surging in industrial control systems, with over 3,000 reported in 2022, prompting urgent calls for enhanced security measures.
Techday 6b108970e0979e4f7dce

Pillar Security reveals critical GenAI vulnerability risks

Fri, 11th Oct 2024
#
secure by design
Pillar Security's latest report reveals alarming vulnerabilities in GenAI applications, with attackers achieving a 90% success rate in data leaks.
Img syywjdjxaaqhucsyxrj0f9no

SolarWinds launches AI engine to transform IT operations

Wed, 22nd May 2024
#
secure by design
SolarWinds unveils a generative AI engine, SolarWinds AI, set to enhance IT operations by prioritising privacy, security, and reliability, starting with its Service Desk.
Img be9wwoyb6ltksm0nrhbsmhd7

Telefónica Tech UK&I unveils NextDefense for future-proofed cybersecurity

Thu, 14th Mar 2024
#
secure by design
Telefónica Tech UK&I unveils NextDefense, a cybersecurity service brand aimed at aiding customers towards a secure digital future, leveraging its global Security Operations Centres network.
Img eyh2orkequvfpaghfpdak9gu

New Relic releases interactive security testing with proof-of-exploit reports

Thu, 14th Mar 2024
#
secure by design
New Relic's observability platform now offers Interactive Application Security Testing (IAST) with a proof-of-exploit reporting feature, enabling real-time identification and fixing of application vulnerabilities before code deployment.
Img 9pdxnpnjpvbnoiotecbwzd2a

Checkmarx & Security Compass unite for enhanced threat modelling

Wed, 13th Mar 2024
#
secure by design
Checkmarx and Security Compass have partnered to increase threat modelling across software development lifecycles, integrating SD Elements to streamline Checkmarx's enterprise application security platform.
Screen shot 2023

Simplifying the security challenge of operating in multi-cloud

Thu, 8th Feb 2024
#
secure by design
Overcoming the challenging complexity of multi-cloud operations requires an innovative approach to security focusing on cloud, clusters, containers, customer data and code, commonly referred to as the '5 C’s'.